-
1
-
-
0024001335
-
Time-memory-processor trade-offs
-
H.R. Amirazizi and M.E. Hellman, Time-Memory-Processor Trade-Offs, IEEE Transactions on Information Theory, vol. IT-34, no. 3 (1988), pp. 505-512.
-
(1988)
IEEE Transactions on Information Theory
, vol.IT-34
, Issue.3
, pp. 505-512
-
-
Amirazizi, H.R.1
Hellman, M.E.2
-
3
-
-
84968521645
-
Solving homogeneous linear equations over GF(2) via block wiedemann algorithm
-
Jan.
-
D. Coppersmith, Solving Homogeneous Linear Equations over GF(2) via Block Wiedemann Algorithm, Mathematics of Computation, vol. 62, no. 205 (Jan. 1994), pp. 333-350.
-
(1994)
Mathematics of Computation
, vol.62
, Issue.205
, pp. 333-350
-
-
Coppersmith, D.1
-
4
-
-
0017501281
-
Exhaustive cryptanalysis of the NBS data encryption standard
-
June
-
W. Diffie and M. Hellman, Exhaustive Cryptanalysis of the NBS Data Encryption Standard, Computer, vol. 10, no. 6 (June 1977), pp. 74-84.
-
(1977)
Computer
, vol.10
, Issue.6
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.2
-
5
-
-
33646743932
-
On the security of double and 2-key triple modes of operation
-
(LNCS 1636), Springer-Verlag, Berlin
-
H. Handschuh and B. Preneel, On the Security of Double and 2-Key Triple Modes of Operation, Fast Software Encryption '99, 6th International Workshop (LNCS 1636), Springer-Verlag, Berlin, 1999, pp. 215-230.
-
(1999)
Fast Software Encryption '99, 6th International Workshop
, pp. 215-230
-
-
Handschuh, H.1
Preneel, B.2
-
7
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
D.E. Knuth, The Art of Computer Programming, vol. 3: Sorting and Searching, second edition, Addison-Wesley, Reading, MA, 1998.
-
(1998)
The Art of Computer Programming, Vol. 3: Sorting and Searching, Second Edition
, vol.3
-
-
Knuth, D.E.1
-
9
-
-
38049095343
-
Analysis of Bernstein's factorization circuit
-
(LNCS 2501), Springer-Verlag, Berlin
-
A.K. Lenstra, A. Shamir, J. Tomlinson, and E. Tromer, Analysis of Bernstein's Factorization Circuit, Advances in Cryptology - Asiacrypt 2002 (LNCS 2501), Springer-Verlag, Berlin, 2002, pp. 1-26.
-
(2002)
Advances in Cryptology - Asiacrypt 2002
, pp. 1-26
-
-
Lenstra, A.K.1
Shamir, A.2
Tomlinson, J.3
Tromer, E.4
-
10
-
-
84947908749
-
Attacking triple encryption
-
(LNCS 1372), Springer-Verlag, Berlin
-
S. Lucks, Attacking Triple Encryption, Fast Software Encryption '98, 5th International Workshop (LNCS 1372), Springer-Verlag, Berlin, 1998, pp. 239-253.
-
(1998)
Fast Software Encryption '98, 5th International Workshop
, pp. 239-253
-
-
Lucks, S.1
-
11
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
12
-
-
0019587141
-
On the security of multiple encryption
-
July
-
R. Merkle and M. Hellman, On the Security of Multiple Encryption, Communications of the ACM, vol. 24, no. 7 (July 1981), pp. 465-467. See also Communications of the ACM, vol. 24, no. 11 (Nov. 1981), p. 776.
-
(1981)
Communications of the ACM
, vol.24
, Issue.7
, pp. 465-467
-
-
Merkle, R.1
Hellman, M.2
-
13
-
-
84976793195
-
-
Nov.
-
R. Merkle and M. Hellman, On the Security of Multiple Encryption, Communications of the ACM, vol. 24, no. 7 (July 1981), pp. 465-467. See also Communications of the ACM, vol. 24, no. 11 (Nov. 1981), p. 776.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 776
-
-
-
14
-
-
84957682846
-
A block lanczos algorithm for finding dependencies over GF(2)
-
(LNCS 925), Springer-Verlag, Berlin
-
P.L. Montgomery, A Block Lanczos Algorithm for Finding Dependencies over GF(2), Advances in Cryptohgy - Eurocrypt'95 (LNCS 925), Springer-Verlag, Berlin, 1995, pp. 106-120.
-
(1995)
Advances in Cryptohgy - Eurocrypt'95
, pp. 106-120
-
-
Montgomery, P.L.1
-
15
-
-
84919085619
-
An improved algorithm for computing discrete logarithms over GF(p) and its cryptographic significance
-
S.C. Pohlig and M.E. Hellman, An Improved Algorithm for Computing Discrete Logarithms over GF(p) and Its Cryptographic Significance, IEEE Transactions on Information Theory, vol. IT-24 (1978), pp. 106-110.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
16
-
-
84966238549
-
Monte Carlo methods for index computation (mod p)
-
July
-
J.M. Pollard, Monte Carlo Methods for Index Computation (mod p), Mathematics of Computation, vol. 32, no. 143 (July 1978), pp. 918-924.
-
(1978)
Mathematics of Computation
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
17
-
-
0020781953
-
Three-dimensional VLSI: A case study
-
A.L. Rosenberg, Three-Dimensional VLSI: A Case Study, Journal of the ACM, vol. 30 (1983), pp. 397-416.
-
(1983)
Journal of the ACM
, vol.30
, pp. 397-416
-
-
Rosenberg, A.L.1
-
18
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
(LNCS 1233), Springer-Verlag, Berlin
-
V. Shoup, Lower Bounds for Discrete Logarithms and Related Problems, Advances in Cryptology - Eurocrypt '97 (LNCS 1233), Springer-Verlag, Berlin, 1997, pp. 256-266.
-
(1997)
Advances in Cryptology - Eurocrypt '97
, pp. 256-266
-
-
Shoup, V.1
-
19
-
-
84947761194
-
Speeding up Pollard's Rho method for computing discrete
-
(LNCS 1423), Springer-Verlag, Berlin
-
E. Teske, Speeding Up Pollard's Rho Method for Computing Discrete Logarithms, Algorithmic Number Theory Symposium III (LNCS 1423), Springer-Verlag, Berlin, 1998, pp. 541-554.
-
(1998)
Algorithmic Number Theory Symposium III
, pp. 541-554
-
-
Teske, E.1
-
20
-
-
4344664954
-
-
Personal communication
-
E. Tromer, Personal communication.
-
-
-
Tromer, E.1
-
21
-
-
85034504281
-
A known-plaintext attack on two-key triple encryption
-
(LNCS 473), Springer-Verlag, Berlin
-
P.C. van Oorschot and M.J. Wiener, A Known-Plaintext Attack on Two-Key Triple Encryption, Advances in Cryptology - Eurocrypt'90 (LNCS 473), Springer-Verlag, Berlin, 1990, pp. 318-325.
-
(1990)
Advances in Cryptology - Eurocrypt'90
, pp. 318-325
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
22
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
P.C. van Oorschot and M.J. Wiener, Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, vol. 12, no. 1 (1999), pp. 1-28.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.1
, pp. 1-28
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
23
-
-
0024056420
-
Locality, communication and interconnect length in multicomputers
-
P.M.B. Vitányi, Locality, Communication and Interconnect Length in Multicomputers, SIAM Journal on Computing, vol. 17 (1988), pp. 659-672.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 659-672
-
-
Vitányi, P.M.B.1
|